2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
Building Trust Territory in Ad Hoc Networks 在Ad Hoc网络中建立信任区域
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.235
Yuan Bai, Xing Zhang, Bin Sun
{"title":"Building Trust Territory in Ad Hoc Networks","authors":"Yuan Bai, Xing Zhang, Bin Sun","doi":"10.1109/IAS.2009.235","DOIUrl":"https://doi.org/10.1109/IAS.2009.235","url":null,"abstract":"Building trust has been recognized as a new security approach for wireless distributed networks. In the paper, we try to provide a completely new view by building trust territory in ad hoc networks. The concept of trust territory is addressed and the approach to build trust territory is also discussed. A trust territory contains all nodes trusted by the node. It is considered secure to communicate with nodes in the trust territories. Theories of sets, relations and graphs help to build trust territories. Trust territory could work in all layers of networks, so its potential for future applications is very promising.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115718461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Accurate Image Juggling Authentication Algorithm 一种精确的图像杂耍认证算法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.274
Jianquan Xie, Qing Xie, Chunhua Yang
{"title":"An Accurate Image Juggling Authentication Algorithm","authors":"Jianquan Xie, Qing Xie, Chunhua Yang","doi":"10.1109/IAS.2009.274","DOIUrl":"https://doi.org/10.1109/IAS.2009.274","url":null,"abstract":"A fragile watermarking algorithm used in accurate tamper authentication of image content is proposed. The algorithm can distinguish tampered pixel points accurately and tolerate transmission error of individual authentication information bits which take place in image transmission. This algorithm produces authentication information by expanding more pixels within four-left, right, up and down directions around the pixel, then the problem that single tampered pixel point can’t be located accurately which cause by some algorithms based on image uncertainty by combining surrounding pixels to locate embedded watermarking bits. Authentication information is embedded after encryption to resolve security vulnerability problem appears in most pixel-level authentic algorithm.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125256280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations 基于不完全语言偏好关系的群体决策方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.204
Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang
{"title":"An Approach to Group Decision Making Based on Incomplete Linguistic Preference Relations","authors":"Tien-Chin Wang, S. Peng, S. Hsu, Jui-Fang Chang","doi":"10.1109/IAS.2009.204","DOIUrl":"https://doi.org/10.1109/IAS.2009.204","url":null,"abstract":"This study not only applies Multi-Criteria Decision Making with Incomplete Linguistic model (InlinPreRa) and uses horizontal, vertical and oblique pairwise comparison algorithms to construct but also expansion group decision making model. When the decision maker is carrying out the pairwise comparison, the following problems can be avoided: time pressure, lack of complete information, the decision maker is lack of this professional knowledge, or the information provided is unreal and thus it is difficult to obtain information.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131596428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks 一种高效的移动Ad Hoc网络匿名路由协议
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.267
Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang
{"title":"An Efficient Anonymous Routing Protocol for Mobile Ad Hoc Networks","authors":"Xiaoqing Li, Hui Li, Jianfeng Ma, Weidong Zhang","doi":"10.1109/IAS.2009.267","DOIUrl":"https://doi.org/10.1109/IAS.2009.267","url":null,"abstract":"Providing anonymous routing in mobile ad hoc networks (MANET) has been a hot issue for the purpose of security and privacy concerns. But there are very few have been done about providing a valid method to detect malicious node and providing a trustworthy protection over whole network. In this paper, we introduce a localized trust management which can primarily remove malicious nodes, and propose an efficient anonymous routing protocol by node that participates in the protocol encrypts entire message with trust key and says Hello to its ancestor within expiration time. It makes malicious node can be detected and isolated from the network. In this way, a anonymous and secure route path can be established in a hostile environment. Meanwhile, it is able to efficiently against the Denial-of-Service (DoS) attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"164 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131462345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising 结合曲线收缩和非线性各向异性扩散的图像去噪变分模型
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.155
Weibin Zhang, Wenjuan Zhang
{"title":"A Variational Model Combining Curvelet Shrinkage and Nonlinear Anisotropic Diffusion for Image Denoising","authors":"Weibin Zhang, Wenjuan Zhang","doi":"10.1109/IAS.2009.155","DOIUrl":"https://doi.org/10.1109/IAS.2009.155","url":null,"abstract":"In this paper, we propose a new variational model for image denoising, which contains two regularizing term. One regularizing term is BV norm, another is formulated in terms of summation in curvelet domain. Solving this new variational model results in an iterative algorithm, which combines naturally Curvelet shrinkage with nonlinear anisotropic diffusion equations. Numerical examples show that the proposed method has good performances for image denoising.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132563875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Common Friends Discovery with Privacy and Authenticity 共同的朋友发现与隐私和真实性
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.208
Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun
{"title":"Common Friends Discovery with Privacy and Authenticity","authors":"Shin-Yan Chiou, Shih-Ying Chang, Hung-Min Sun","doi":"10.1109/IAS.2009.208","DOIUrl":"https://doi.org/10.1109/IAS.2009.208","url":null,"abstract":"In this paper, we propose a common friend discovery algorithm considering the privacy of users and the authenticity of friend relationships. The privacy means users’ other friends’ information does not be leaked except their common friends. The authenticity signifies anyone can not successfully claim he is a friend of someone unless he really is. It has many applications such as playing games by friends, finding talking-topics by strangers, finding introducer of job interview, finding matchmaker of someone you desire to know, etc. We consider its security and matching probability. We also implement the algorithm in two mobile phones to prove that it is workable.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132339722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Distributed Event-Triggered Trust Management for Wireless Sensor Networks 无线传感器网络的分布式事件触发信任管理
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.69
Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Q. Peng
{"title":"Distributed Event-Triggered Trust Management for Wireless Sensor Networks","authors":"Sibo Liu, Liaojun Pang, Qingqi Pei, Hua Ma, Q. Peng","doi":"10.1109/IAS.2009.69","DOIUrl":"https://doi.org/10.1109/IAS.2009.69","url":null,"abstract":"Trust management is an important issue in wireless sensor networks (WSNs). In this paper, we introduce the concept of trust and design a distributed event- triggered trust management model for WSNs. It combines cryptography, statistics, economics, data analysis and the other related fields. In this way, we can immediately identify and isolate the malice node, thereby creating a secure and reliable wireless sensor networks that can avoid some common attacks and ensure the security of the applications. And, we give the communication process and the computation model as well as how each trust management module works. So it is no longer a simple calculation model or a simple frame structure, and it has realistic feasibility and operability.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132444532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology 基于电磁拓扑的计算机系统信息安全广义分析模型
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.306
Jin Tian, Y. Qiu, Ankun Lin
{"title":"Generalized Analysis Model of Information Security of Computer System Based on Electromagnetic Topology","authors":"Jin Tian, Y. Qiu, Ankun Lin","doi":"10.1109/IAS.2009.306","DOIUrl":"https://doi.org/10.1109/IAS.2009.306","url":null,"abstract":"According to the character of the typical serial information leakage and the feature in the information leakage problem that multiple points (zone) converge and couple toward one point (zone), several key concepts, such as the emission zone, transmission zone and receiving zone, are defined in this paper. Based on the idea of electromagnetic topology, a completely new construction method of system topological graph is proposed. Then, this method is applied to analyze a simplified serial information leakage system, the generalized transmission coupling model is also established. What’s more, the modeling process of field-to-field coupling is discussed emphatically. Therefore a solid foundation is laid for the electromagnetic topology analysis of serial information leakage.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"313 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133224380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardware/Software Codesign of Resource Constrained Real-Time Systems 资源受限实时系统的软硬件协同设计
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.19
Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh
{"title":"Hardware/Software Codesign of Resource Constrained Real-Time Systems","authors":"Chia-Cheng Lo, Jung-Guan Luo, Ming-Der Shieh","doi":"10.1109/IAS.2009.19","DOIUrl":"https://doi.org/10.1109/IAS.2009.19","url":null,"abstract":"System-level design methods can provide a systematic and effective way of evaluating various design options, thus shortening the product development time. This paper relaxes the HC algorithm by considering the K best candidates in each clustering iteration to alleviate the possibility of being trapped in local minimum during hardware/software (HW/SW) partition. We also present an architecture mapping algorithm together with the defined sensitivity measure to further reduce the hardware requirement. Simulation results show that the complexity of exploration time can be greatly reduced with only little performance loss as compared to the exhaustive search. The proposed algorithm can thus provide a good compromise between exploration time and accuracy.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121669423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Intrusion Detection System for Network Storage Based on System Calls 基于系统调用的网络存储入侵检测系统
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.100
Li-zhong Geng, Hui-bo Jia
{"title":"An Intrusion Detection System for Network Storage Based on System Calls","authors":"Li-zhong Geng, Hui-bo Jia","doi":"10.1109/IAS.2009.100","DOIUrl":"https://doi.org/10.1109/IAS.2009.100","url":null,"abstract":"Rapid increase of information resources speeds the development of network storage. And security of network storage satisfies the demands of privacy and safety of the information. Data encryption and personal identity authentication which are based on cryptography can protect the storage against non-authorized access, while they are ineffective for malicious authorized users and inherent attacks. Also heavy performances affect the control of storage. This paper demonstrates an efficient intrusion detection system model for network-attached storage based on system calls and improves the Process Homeostasis to realize the implementation. The experimental results demonstrate high detection rate and low false detection rate. The total performance is about 3% additions when the detection system is running normally.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116603087","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信